Commit Graph

683276 Commits

Author SHA1 Message Date
Jonathan Watt
95d3472017 Bug 1601694 pt2. Remove redundant Windows range/ifame selection code. r=bobowen
This code should have been removed in the original part, landed as:
https://hg.mozilla.org/mozilla-central/rev/3a6a9814936d

Differential Revision: https://phabricator.services.mozilla.com/D56094

--HG--
extra : moz-landing-system : lando
2019-12-05 23:27:13 +00:00
Emilio Cobos Álvarez
4695746608 Bug 1601732 - Update in-tree dependencies to smallvec 1.0. r=glandium
We're vendoring it already so no reason not to. Only a couple dependencies left
after these to get rid of 0.6.

Differential Revision: https://phabricator.services.mozilla.com/D56044

--HG--
extra : moz-landing-system : lando
2019-12-05 23:30:59 +00:00
Agi Sferro
d87305d23c Bug 1599580 - Implement install/uninstall extension. r=snorp,esawin
Differential Revision: https://phabricator.services.mozilla.com/D55730

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:10 +00:00
Agi Sferro
b6568ba03f Bug 1599580 - Set useAddonManager for extension tests that interact with GeckoView. r=snorp
Non-AddonManager extensions are invisible to GeckoView, so when a message like
"open a new tab" comes to GeckoView we will ignore them unless the extension is
properly registered.

Because of this, we need to register them in tests too.

Differential Revision: https://phabricator.services.mozilla.com/D56035

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:06 +00:00
Agi Sferro
24e053777c Bug 1599580 - Rename blockedReason -> blocklistState. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55729

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:08 +00:00
Agi Sferro
af5e7ed97d Bug 1599580 - Make GeckoViewWebExtension.extensionById async. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55728

--HG--
extra : moz-landing-system : lando
2019-12-05 23:15:57 +00:00
Agi Sferro
171b779fad Bug 1599580 - Make Extensions.get(id) asynchronous. r=snorp
This is a pre-requisite for making extensions persistent, as sometimes we have
to fetch state from Gecko, so getting the extension needs to be async.

Differential Revision: https://phabricator.services.mozilla.com/D55579

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:04 +00:00
Agi Sferro
7767a79f5b Bug 1599580 - Fix typo in setPromptDelegate. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55727

--HG--
extra : moz-landing-system : lando
2019-12-05 23:15:59 +00:00
Agi Sferro
4b6b64b2b4 Bug 1599580 - Allow null aBrowser in AddonManager.installAddonFromWebpage. r=mixedpuppy,snorp
GeckoView will install extensions from the native UI so it doesn't have a
browser object to pass into this method.

Differential Revision: https://phabricator.services.mozilla.com/D55726

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:02 +00:00
Nan Jiang
924235d1ad Bug 1601754 - Add Pocket tile type to Top Story click ping to New Tab Page r=thecount
Differential Revision: https://phabricator.services.mozilla.com/D56050

--HG--
extra : moz-landing-system : lando
2019-12-05 21:36:45 +00:00
Edwin Takahashi
c8ed3e2d35 Bug 1600386 - install gnome-icon-theme in docker image for test_ext_downloads_misc.js r=rpl
Changes:

Install `gnome-icon-theme` package in the docker image, so the xpcshell test `test_ext_downloads_misc.js` does not fail looking for something that does not exist.

Differential Revision: https://phabricator.services.mozilla.com/D56091

--HG--
extra : moz-landing-system : lando
2019-12-05 23:16:56 +00:00
Emilio Cobos Álvarez
dbce8ec6b5 Bug 1587468 - follow-up: Update webrender's lockfile in a CLOSED TREE.
MANUAL PUSH: bustage
2019-12-06 00:15:34 +01:00
Brian Hackett
c3c8b4c388 Bug 1600979 - Ignore exceptions from getFrames call when thread context is invalid, r=jlast.
Differential Revision: https://phabricator.services.mozilla.com/D55692

--HG--
extra : moz-landing-system : lando
2019-12-05 23:13:42 +00:00
Sean Feng
93f9021bb1 Bug 1589700 - Record the number of unique site origins across all tabs r=smaug,agi,Dexter
Differential Revision: https://phabricator.services.mozilla.com/D54027

--HG--
extra : moz-landing-system : lando
2019-12-05 23:13:24 +00:00
shindli
d0e6e72266 Backed out 7 changesets (bug 1599580) for causing linting opt failure CLOSED TREE
Backed out changeset 64fd40663930 (bug 1599580)
Backed out changeset 7dc53077d58a (bug 1599580)
Backed out changeset 51a8fbed80c3 (bug 1599580)
Backed out changeset e7fbe7147d19 (bug 1599580)
Backed out changeset 176337e5ba59 (bug 1599580)
Backed out changeset 24d4083da050 (bug 1599580)
Backed out changeset 312f626fb657 (bug 1599580)
2019-12-06 01:10:47 +02:00
Barret Rennie
1bf300b45c Bug 1601047 - Mark composition recorder as stopped when stopping it r=mstange
Differential Revision: https://phabricator.services.mozilla.com/D55716

--HG--
extra : moz-landing-system : lando
2019-12-03 20:37:21 +00:00
Emilio Cobos Álvarez
31291d2cdd Bug 1587468 - Update derive_more. r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D56043

--HG--
extra : moz-landing-system : lando
2019-12-05 22:46:59 +00:00
Dana Keeler
4488a492b1 bug 1586855 - incorporate CRLite filters into cert_storage r=jcj,kjacobs
This patch implements CRLite lookups for TLS server certificate revocation
information in telemetry-only mode. It adds a new preference
"security.pki.crlite_mode" to control the behavior of this feature. Setting
this preference to 0 disables it completely. Setting it to 1 enables telemetry
collection only (the default). Setting it to 2 enables enforcing revocation
information found via CRLite.

Differential Revision: https://phabricator.services.mozilla.com/D54040

--HG--
rename : third_party/rust/bit_reverse/LICENSE-APACHE => third_party/rust/rental/LICENSE-APACHE
rename : third_party/rust/bit-vec/LICENSE-MIT => third_party/rust/rental/LICENSE-MIT
extra : moz-landing-system : lando
2019-12-05 22:41:53 +00:00
Agi Sferro
28eecfc053 Bug 1599580 - Implement install/uninstall extension. r=snorp,esawin
Differential Revision: https://phabricator.services.mozilla.com/D55730

--HG--
extra : moz-landing-system : lando
2019-12-05 22:23:54 +00:00
Agi Sferro
03015a6b09 Bug 1599580 - Set useAddonManager for extension tests that interact with GeckoView. r=snorp
Non-AddonManager extensions are invisible to GeckoView, so when a message like
"open a new tab" comes to GeckoView we will ignore them unless the extension is
properly registered.

Because of this, we need to register them in tests too.

Differential Revision: https://phabricator.services.mozilla.com/D56035

--HG--
extra : moz-landing-system : lando
2019-12-05 22:24:21 +00:00
Agi Sferro
075b50c9f3 Bug 1599580 - Rename blockedReason -> blocklistState. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55729

--HG--
extra : moz-landing-system : lando
2019-12-05 20:11:04 +00:00
Agi Sferro
9034f6546c Bug 1599580 - Make GeckoViewWebExtension.extensionById async. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55728

--HG--
extra : moz-landing-system : lando
2019-12-05 16:35:41 +00:00
Agi Sferro
741c6f7529 Bug 1599580 - Make Extensions.get(id) asynchronous. r=snorp
This is a pre-requisite for making extensions persistent, as sometimes we have
to fetch state from Gecko, so getting the extension needs to be async.

Differential Revision: https://phabricator.services.mozilla.com/D55579

--HG--
extra : moz-landing-system : lando
2019-12-05 16:35:41 +00:00
Agi Sferro
2850aa9f64 Bug 1599580 - Fix typo in setPromptDelegate. r=snorp
Differential Revision: https://phabricator.services.mozilla.com/D55727

--HG--
extra : moz-landing-system : lando
2019-12-05 16:35:41 +00:00
Agi Sferro
4f9802d34f Bug 1599580 - Allow null aBrowser in AddonManager.installAddonFromWebpage. r=mixedpuppy,snorp
GeckoView will install extensions from the native UI so it doesn't have a
browser object to pass into this method.

Differential Revision: https://phabricator.services.mozilla.com/D55726

--HG--
extra : moz-landing-system : lando
2019-12-05 16:35:42 +00:00
Aaron Klotz
1c70c3f3cb Bug 1601781: Forward declare ContentParent in BrowsingContextGroup; r=kmag CLOSED TREE
Differential Revision: https://phabricator.services.mozilla.com/D56088

--HG--
extra : histedit_source : 004456e40c7ac4ef1ec64e3881e6e70e9f09dfc4
2019-12-05 14:46:45 -07:00
Brindusan Cristian
a2cf032227 Backed out changeset d3bd59939150 (bug 1601781) for build bustages at BrowsingContextGroup.h. CLOSED TREE 2019-12-06 00:16:31 +02:00
Aaron Klotz
a7a405d52f Bug 1522830: Part 13 - Update third-party-modules ping to acquire data from child processes; r=janerik
Differential Revision: https://phabricator.services.mozilla.com/D53686

--HG--
extra : moz-landing-system : lando
2019-12-05 22:01:30 +00:00
Aaron Klotz
8bc4f093b0 Bug 1522830: Part 12 - ASAN fix for DllBlocklistInit in launcher process; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D53685

--HG--
extra : moz-landing-system : lando
2019-12-05 22:00:50 +00:00
Aaron Klotz
b0c0ca9ca2 Bug 1522830: Part 11 - Adjust shutdown phase in widget/windows/WinUtils for telemetry whitelisting; r=mhowell
The current shutdown phase is too early and thus may crash when called
by `UntrustedModulesProcessor`. We move it to a later phase such that the
processor has already shut down.

Differential Revision: https://phabricator.services.mozilla.com/D53683

--HG--
extra : moz-landing-system : lando
2019-12-05 22:00:07 +00:00
Aaron Klotz
a97a4ef52c Bug 1522830: Part 10 - Add IPC for untrusted modules to RDD; r=mjf
* The parent process needs to be able to request the child process to provide
  its untrusted modules telemetry. This is done via `GetUntrustedModulesData`.
* The child process needs to be able to determine which of its module loads are
  trusted, and which are not. Since the child process is sandboxed, it must
  delegate that work to the parent process. This is done via `GetModulesTrust`.
* The handlers for these functions just pass the requests on to DLL Services
  to do the actual processing.

Differential Revision: https://phabricator.services.mozilla.com/D53682

--HG--
extra : moz-landing-system : lando
2019-12-05 21:59:29 +00:00
Aaron Klotz
4890f302b3 Bug 1522830: Part 9 - Add IPC for untrusted modules to Content; r=jmathies
* The parent needs to be able to request the child to provide its untrusted
  modules telemetry. This is done via `GetUntrustedModulesData`.
* The child needs to be able to determine which of its module loads are trusted,
  and which are not. Since the child is sandboxed, it must delegate that work
  to the parent process. This is done via `GetModulesTrust`.

Differential Revision: https://phabricator.services.mozilla.com/D53681

--HG--
extra : moz-landing-system : lando
2019-12-05 21:58:23 +00:00
Aaron Klotz
4204671639 Bug 1522830: Part 8 - Update UntrustedModulesProcessor to support processing child processes; r=mhowell
This patch contains the core changes to make this all work across e10s:

* We clarify the naming of path variables to be more specific as to whether they are NT paths or DOS paths;
* We add IPC `ParamTraits` that are necessary for `UntrustedModulesData` types;
* We implement `ProcessModuleLoadQueue` for child processes. Because of sandboxing, we need to split this sequence into multiple async operations:
  ** Initial queue processing;
  ** Sending the list of modules to the parent process to determine trustworthiness (via `GetModulesTrust`);
  ** Receiving the results from the parent process and producing a final result (via `CompleteProcessing`).
* We implement the `GetModulesTrust` function for the parent process, which evaluates the trust of child process modules;
* We change all hash tables to be keyed using NT paths. Because resolving DOS paths may not be permitted in sandboxed processes,
  we need to standardize on NT paths as the "universal path" across processes.
* We add `WinDllServices::StartUntrustedModulesProcessor` to separate untrusted modules startup from `WinDllServices` construction:
  ** While we now start `WinDllServices` across all child process types, only specific process types will support untrusted modules.
  ** Furthermore, untrusted modules must be started at a very specific point that is dependent on the type of child process.
  ** We add those calls to `StartUntrustedModulesProcessor` in subsequent patches.

Differential Revision: https://phabricator.services.mozilla.com/D53680

--HG--
extra : moz-landing-system : lando
2019-12-05 21:57:29 +00:00
Aaron Klotz
250ba21fbc Bug 1522830: Part 7 - Initialize launcher process blocklist during launch of sandboxed child process; r=bobowen
When launching a sandboxed child process that uses `firefox.exe`, we now
perform early initialization of the DLL blocklist.

Differential Revision: https://phabricator.services.mozilla.com/D53679

--HG--
extra : moz-landing-system : lando
2019-12-05 21:55:45 +00:00
Aaron Klotz
a62a0441c9 Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell
We need a way for the sandbox broker to be able to initialize the launcher
DLL blocklist when starting a new content process.

This patch adds the ability to resolve the initialization function through
DLL services.

Differential Revision: https://phabricator.services.mozilla.com/D53678

--HG--
extra : moz-landing-system : lando
2019-12-05 21:55:02 +00:00
Aaron Klotz
e27c1bca50 Bug 1522830: Part 5 - Provide a launcher result type that unconditionally includes file and line info; r=mhowell
`LauncherResult` only includes file and line info when built into the launcher
process. Now that there will be `xul.dll`-based code calling into launcher
process startup, this would create an ABI mismatch.

This patch creates a new type, `LauncherResultWithLineInfo`, that
unconditionally includes the file and line so that APIs called by both `xul`
and non-`xul` code can have the same ABI for both.

Differential Revision: https://phabricator.services.mozilla.com/D53677

--HG--
extra : moz-landing-system : lando
2019-12-05 21:53:41 +00:00
Aaron Klotz
c15ae2a867 Bug 1522830: Part 4 - Add constexpr constructor and assignment operator from uint64_t to ModuleVersion; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D53676

--HG--
extra : moz-landing-system : lando
2019-12-05 21:52:51 +00:00
Aaron Klotz
21f179a116 Bug 1522830: Part 3 - Change launcher blocklist generation to include child processes; r=bytesized
Now that the launcher blocklist will support child processes, we need to add
them to the launcher blocklist. The revised criteria the `Launcher` blocklist
matches the criteria already in use by the `Legacy` blocklist.

Differential Revision: https://phabricator.services.mozilla.com/D53675

--HG--
extra : moz-landing-system : lando
2019-12-05 21:52:13 +00:00
Aaron Klotz
1faa66d3d6 Bug 1522830: Part 2 - Make launcher blocklist work in child processes; r=mhowell
* We change `InitializeDllBlocklistOOP` to be able to set the correct flags
  when initializing a sandbox child process.
* We change the freestanding DLL blocklist code to be sensitive to the
  `CHILD_PROCESSES_ONLY` flag;
* We move the declaration of `gBlocklistInitFlags` to `WindowsDllBlocklist.h`
  so that it is visible to more code.

Differential Revision: https://phabricator.services.mozilla.com/D53674

--HG--
extra : moz-landing-system : lando
2019-12-05 21:51:35 +00:00
Aaron Klotz
9a66b26b8a Bug 1522830: Part 1 - Init legacy blocklist using gBlocklistInitFlags; r=mhowell
When we initialize the legacy blocklisting code, we should carry forward any
flags that were set by the launcher process and/or sandbox launcher.

Differential Revision: https://phabricator.services.mozilla.com/D53672

--HG--
extra : moz-landing-system : lando
2019-12-05 21:51:33 +00:00
Aaron Klotz
ebc8ee2b4d Bug 1601781: Forward declare ContentParent in BrowsingContextGroup; r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D56088

--HG--
extra : moz-landing-system : lando
2019-12-05 21:54:47 +00:00
Kris Maglione
5f6b4fac7c Bug 1571569: Check for correct document in blockParsing test. r=zombie
Differential Revision: https://phabricator.services.mozilla.com/D55906

--HG--
extra : moz-landing-system : lando
2019-12-05 14:23:33 +00:00
Andreas Pehrson
f6d76a1f88 Bug 1392945 - Wait for "seeked" instead of "playing". r=alwu
Differential Revision: https://phabricator.services.mozilla.com/D55952

--HG--
extra : moz-landing-system : lando
2019-12-05 21:12:14 +00:00
Kris Maglione
c1a5e74b7f Bug 1601768: Don't register BrowserContentHandler in content processes. r=mconley
It only works in the parent process, and if we wind up falling back to it in a
content process, it can only cause trouble.

Differential Revision: https://phabricator.services.mozilla.com/D56059

--HG--
extra : moz-landing-system : lando
2019-12-05 21:14:45 +00:00
Jonathan Watt
d3067dbcb3 Bug 1601694. Remove the redundant Windows range/ifame selection code. r=bobowen
There is no need for this code to set the kEnableSelectionRB bit. nsPrintJob
already sets it before it calls nsIPrintingPromptService::ShowPrintDialog.

Differential Revision: https://phabricator.services.mozilla.com/D55992

--HG--
extra : moz-landing-system : lando
2019-12-05 18:24:27 +00:00
Brindusan Cristian
4b11b63400 Backed out changeset b89936db7178 (bug 202251) for bc failures at browser_misused_characters_in_strings.js. CLOSED TREE 2019-12-05 23:10:09 +02:00
Gabriel Luong
db27a01299 Bug 1601761 - Enable the PiP audio toggle in nightly. r=mconley
Differential Revision: https://phabricator.services.mozilla.com/D56055

--HG--
extra : moz-landing-system : lando
2019-12-05 20:36:24 +00:00
Olli Pettay
ead4eb0615 Bug 1596958 - Synchronize layouthistorystate to parent process, r=peterv
Differential Revision: https://phabricator.services.mozilla.com/D53288

--HG--
extra : moz-landing-system : lando
2019-12-05 20:30:45 +00:00
Jeff Muizelaar
67dbd2a194 Bug 1595586. Add documentation for gfx.ContentBackend. r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D55851

--HG--
extra : moz-landing-system : lando
2019-12-04 18:43:53 +00:00
Mark Striemer
7609763e4b Bug 1564525 - Remove extensions.htmlaboutaddons.enabled pref r=Gijs
Depends on D55720

Differential Revision: https://phabricator.services.mozilla.com/D56028

--HG--
extra : moz-landing-system : lando
2019-12-05 18:49:43 +00:00